Archive Search

  • ...enter the project here:artport.whitney.orgScroll down to launch ProjectPlease adjust your Java Security Settings in order to launch the Programme.Commissioned by the Whitney Museum.
  • ... of commenting on the projects, artists started to 'remix' their work, applying their own code to other projects or combining sections of code into a new project. One does not need to be a programmer and have an in-depth understanding of computer languages to...
  • ... Whitney Museum's Artport (for CODeDOC) or the digitalartarchive.at (for CODeDOC II). Please check the information on Java security Settings, or other programmes used in the artworks beforehand.VIDEO NARRATIVE:The Videos by the ADA Team shortly demonstrate...
  • ... systems, as well as the supposed virtualization of war that accompanies it, touches on fundamental legal, ethical, and security issues.
  • Crack it !
    ... installed in Hamburg's tube trains. Hacking and the controversies surrounding privacy, the public domain and data security would have been brought closer - metaphorically and literally - to some 800,000 passengers a week. It foresaw the...
  • CrossWorlds -
    ...the same time like a dissident’s practice (an other way of encoding!) and like a monitoring following by manipulation – all kind of secret service’s practice. Because of my ex-soviet origin, I’m extremely impressed with the Berlin’s House of World Cultures. A lot of...
  • ... the deeper one mines, the more layered the date, the less time there is to mine through the data. One has a total of 333 seconds to mine this databody and receives only fragments of words, images and sounds. (Victoria Vesna)
  • ... and one of his patients, a Dancer, paralleled by an affair between a Royal Commission investigator and Bailey's former Secretary. The story is composed of a series of narrative recollections exploring the events leading up to the Dancer’s death,...
  • ... image. The film was recorded by a high-speed camera and documents the pitch of a giant wave during a storm—capturing a few seconds in a small segment of the ocean. ...
  • ... of a desire. Our consumption habits, our criminal history, our chronic diseases, even our photographs taken by a security camera - all are stored in bar codes, assimilating them to the physical ID of the DNA. What happens if the DNA merges with...